Σχόλια 0

Το κείμενο του εγγράφου

1

Part 1:

Networking Fundamentals

2

Look for the newest version of this manualon Lulu.com on August 1st. The newmanual has Win2K labs and uses IOS 12.0-12.3 for the labs. There are also somesecurity labs within that book. I have alsowritten acomputer security fundamentalsbook called

“The Script Kiddie Cookbook”

that also will be available from Lulu in mid-August. Thanks and I hope you enjoy thebook. Please send me any edits too.Thanks!

3

Searching CISCO for CCNA Test information

Objective:

To learn how to find out the latest CCNA test information from the CISCO website.

Tools and Materials:

(1) PC with Internet access

Step-By-Step Instructions:

1.

Open a browser window.

2.

Navigate towww.cisco.com. You should see:

Figure 1—The main CISCO webpage.

3.

Next, scroll down. On the left hand side you should see a link under the“Training, Events, & Seminars” heading called “Training/Certifications.” Youshould see:

Figure 2—Scroll down to the Training heading and look for “certifications.”

4

4.

Click on the link for “certifications.” The page you should see next is:

Figure 3—Training and Certifications main page.

5.

Then scroll down again to the “current exams and outlines” link. It will take youto the page for current exams and outlines (isn’t that nice?). You should see:

Figure 4—Current exams and outlines page.

6.

Once again, scroll down until you find the CCNA 640-607 exam. You should see(figure 5 on next page).

5

Figure 5—Scroll down to CCNA exam.

7.

Click on the link “640-607” and another window should open. You should see:

Figure 6—CCNA test main page.

8.

Again, scroll down a bit and you should see some available options (hyperlinks).You should see (figure 7 on next page):

6

practice simulation

very general topics…really not too much help

Figure 7—CCNA main page.

9.

The simulation tool link will open another page. The instructions will read“Effective March 12, 2002, in addition to multiple choice and fill-in responsequestions, Cisco Career Certifications exams may include performance simulationquestions. Performance simulations are test problems that approximate a real-lifeenvironment on a candidate's computer screen. Candidates will be presented witha real-life scenario and a networking topology to address specific tasks throughappropriate responses. The responses that a candidate enters must be the same asthose one would expect in a real-life networking situation. Prior to taking theCCNA 640-607 exam (the first exam to includesimulations), candidates shouldbecome familiar with the exam simulation tool. Such practice will allowcandidates to focus their exam-taking effort on the exam questions rather thanhow to correctly use the tool. To learn more about the simulation tool, use thefollowing graphic tutorial.” You may want to spend some time going through theinstructions. Figure out if short-cut keystrokes are allowed or not.

10.

Also look at the description of exam topics. Use this to guide your studies as youprogress through your CCNA training.

So what have I learned here?

In this lab you have learned how to find the CCNA test objectives. Consider this sort of a“table of contents” for your studies, even though CISCO is extremely vague with theirtest information. It really doesn’t help all that much.

7

DOS Lab

Objective:

This lab is designed to become familiar with basic DOS commands and utilities onWindows Operating Systems.

Tools and Materials:

(1) Computer with Windows 95/98.

paper and pencil

Background:

In this lab

you will learn about DOS…no, DOS is not dead! Being able to master simpleDOS commands and utilities will enhance your networking skills considerably, especiallyin troubleshooting network problems. You may even wish to purchase a DOS tutorial atsome point in your networking career. Many operating systems (windows-based too) useDOS commands for updates, patches, and maintenance. I know the Novell systemfrequently makes use of changing file attributes before applying new patches to theoperating system. These are done with DOS-like commands. UNIX/LINUX is heavilyDOS-command style oriented. If you want to get into computer security then you willhave to live, eat, and breathe

DOS and UNIX.

Step-By-Step Instructions:

1.

Opening DOS. Open the MS-DOS prompt into a full-window. If you are notsure, then follow these steps.

a.

Click on the “start” button on your task bar.

b.

Click on “programs.”

c.

Search for and click on MS-DOS prompt (see figure 1). A black screen ora window with a black screen should appear.

Figure 1—Starting MS-DOS from the task bar.

8

d.

If you want to be a show-off then click on “Start” then “Run.” The pop-upwindow should see something like figure 2 (without the Windows menuon the side).

To make the window fill your entire screen press the button with thearrows in all direction (like a compass pointer).If you want to get thewindow back then press Alt+Enter. If you want to leave the MS-DOSprompt session open in a full window, but you want to copy somethingfrom Windows you can use Alt+tab to “shuttle” between open programs.This is the hallmark of “switching between windows.”

9

g.

If you really have some time to kill then go to “Start” then “Programs”then (but don’t click on it) “MS-DOS Prompt.” Once you are there right-click on it and select properties. You should see a window like figure 4.

Figure4—MS-DOS properties.

h.

Ok…now you can really start showing off…click on the “misc” tab. Youwill see something like figure 5.

Figure 5—MS-DOS prompt miscellaneous settings.

10

i.

Here you can change which shortcut keys are allowed, sensitivity, etc.There are some neat settings under the screen tab also. Lots of things toplay with and lots of things to do with DOS.

2.

DOS prompt and directory file structure. The DOS prompt and DOS system canbe thought of similar to a filing cabinet. If you have three drives (C, D, and E)then each one can be thought of as separate filing cabinets C, D, and E. Each ofthose cabinets are then called the “root” directory of each cabinet. Each rootdirectory can contain many different “directories.” These directories can

bethought of as drawers in the cabinets. From there each directory can containmany different “sub-directories” similar to folders. Each “sub-directory” cancontain other subdirectories and so on…at any point (root, directory, sub-directory, etc) can contain computer files (thought of similar to documents…theycan be placed in a folder, drawer, etc). So lets take a peak and put this all intoperspective…

C:\

Root prompt

C:\Windows

directory called “windows” of root “C”

C:\Windows\System

sub-directory called “system” in directory“windows” of root “C”

Let’s look at an example of navigation with DOS. Using the directory “tree”structure shown on the next page (figure 6) we could write down the paths forcertain files. For example the completepath to the album.zip file would become:

C:\MY_Documents\My_Pictures\album.zip

See if you can give the complete path for the following files (This is not whatyour computer will look like…just a make-believe one for this exercise):

autoexec.bat ______________________________________________________

letter.doc__________________________________________________________

winzip.exe ________________________________________________________

word.exe __________________________________________________________

command.com _____________________________________________________

11

C:\

|___CDDROM\

|___MY_Documents\

|

|___My_Pictures\

|

|

|___picnic.gif

|

|

|___Christmas.gif

|

|

|___album.zip

|

|

|

|___My _Files\

|

|

|___addresses.doc

|

|

|___letter.doc

|

|

|___resume.doc

|

|

|

|___My_Webs\

|

|___Program_Files\

|

|___Accessories\

|

|

|___Backup\

|

|

|

|___System\

|

|

|___Hyperterminal\

|

|___Microsoft_Office\

|

|

|___Office\

|

|

|

|___Excel\

|

|

|

|___Powerpoint\

|

|

|

|___Word\

|

|

|

|___word.exe

|

|

|___Stationery\

|

|

|___Templates\

|

|___WinZip\

|

|___winzip.exe\

|___Temp\

|

|___Windows\

|

|___System\

|

|___autoexec.bat

|___config.sys

|___command.com

Figure 6—Hypothetical directory tree.

Make a map of the structure of the C:\

drive on your computer. Be sure to includeall sub-directories and folders if you have time. (This is probably gonna take awhile…)

12

Navigation.

The next thing to learn is navigating and finding files in DOS. We haveseveral commands and techniques for doing this. Sometimes this is called navigating the“tree.” The first command you will learn allows you to change directories. You do thisby typing “CD” or “CHDIR” at any prompt and the root/directory/ subdirectory you wishto change to. For

example, when we first open our DOS window we see the prompt:“C:\Windows\desktop>” If we wanted to navigate to the my documents file directory(C:\windows\my documents) we could switch to it in one of several ways…(1) type “CDC:\windows\mydocu~1” or (2) type “CD..” this will change you from the directory“desktop” prompt to the “C:\windows” prompt. Then type “CD mydocu~1” to change tothe my documents directory. Please note that you can use the dot-dot to go back onelevel with the CD command. If your prompt was C:\windows\system\oobe you couldtype “CD ….” to return to the root. Two dots for one level and one dot for every levelthereafter. This is called “going up the tree.” Its opposite, “going down the tree,”requires you typing in each directory or subdirectory. For example, to go from “C:” to“C:\windows\system\oobe” you could type “CD: C:\

windows\system\oobe” or from theroot prompt type “CD windows” hit enter then type “CD system” hit enter, then type “CDoobe.” There are literally manydifferent ways to do the same thing.

So using figure 6 as a guide what would you type at the following prompts (don’tactually do it…your computer file structure will be way different)?

From c:\windows to get to the root prompt ___________________________

From letter.doc back up two levels ____________________________________

From winzip folder to system folder ____________________________________

From word.exe to temp folder ________________________________________

3.

Finding Files in DOS. DOSincorporates a searching mechanism. To find aspecific file you use a directory statement, then the file name. For example, if wewere looking for the c:\autoexec.bat file we would (1) open the MS-DOS promptwindow, (2) switch to the root directory, and(3) use a directory statement to findthe file. (See script 1 for syntax). You must be in the correct folder to find thefile otherwise you will be unsuccessful.

C:\windows>

C:\windows> CD..

C:\dir autoexec.bat

Autoexec.bat

338

12-02-2001

7:52a

autoexec.bat

Script 1—finding a specific file

13

Sometimes we do not always know or cannot remember the exact file name. Forthose times we can use a wildcard character. Say for example we knew it was anautoexec file but couldn’t remember the extension. Wecan just do a directory forall files named autoexec by typing “dir autoexec.*” The asterisk will replace anyone or any number of characters as in “dir *utoexec.*” If files namedbutoexec.com, cutoexec.zip, and futoexec.wiz existed on the directory beingsearched, then they all would be listed. As Emeril says, “let’s kick it up a notch!”If we wanted to see all files in a directory then we would type “dir *.*” but, becareful, too many files might whiz by…in that case we could append /p to the endof the command to only list one page at a time…then we would have to hit anykey to see the next page(s) one at a time “dir *.* /p” Getting tired of too manypages? Just press control+C to cancel the action. You can get a “widescreen”view using the /w option…“dir *.* /w” or combine them: “dir *.* /w /p”

What batch files (.bat) are found at the root, the windows, and windows\systemfolders on your computer?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

What command files (.com) are found at the root, the windows, andwindows\system folders

on your computer?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

What executable files (.exe) are found at the root, the windows, andwindows\system folders on your computer?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

What system files (*.sys) are found at the root, the windows, and windows\systemfolders on your computer?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

What are some of the other files found on your root?

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

14

4.

Getting help.

To find out any subcommand or options available with a commandjust append /? to the command. For example, if we wanted to find out thesubcommands available with ping type “ping /?” and read away!

What do these commands do? (Hint: some will not have anything listed for help)

Internal commands: Built into the operating system file (command.com) andloaded into memory whenever your computer is turned on.

break

______________________________________________________

call

______________________________________________________

cd

______________________________________________________

chcp

______________________________________________________

cls

______________________________________________________

copy

______________________________________________________

ctty

______________________________________________________

date

______________________________________________________

del

______________________________________________________

echo

______________________________________________________

exit

______________________________________________________

for

______________________________________________________

goto

______________________________________________________

if

______________________________________________________

mkdir

______________________________________________________

path

______________________________________________________

pause

______________________________________________________

prompt

______________________________________________________

rem

______________________________________________________

ren

______________________________________________________

rmdir

______________________________________________________

set

______________________________________________________

shift

______________________________________________________

time

______________________________________________________

type

______________________________________________________

ver

______________________________________________________

verify

______________________________________________________

vol

______________________________________________________

External commands: files with *.com or *.exe extensions. These are not built intothe operating system and can vary between operating system versions.

attrib

______________________________________________________

chkdsk

______________________________________________________

command

______________________________________________________

deltree

______________________________________________________

diskcopy

______________________________________________________

fc

______________________________________________________

fdisk

______________________________________________________

15

find

______________________________________________________

format

______________________________________________________

keyb

______________________________________________________

label

______________________________________________________

mode

______________________________________________________

more

______________________________________________________

nlsfunc

______________________________________________________

setver

______________________________________________________

sort

______________________________________________________

subst

______________________________________________________

sys

______________________________________________________

xcopy

______________________________________________________

5.

Make some files. Open up your notepad and create some files in the c:\tempfolder:

File name

Contents

Dave.txt

This is Dave’s text file…so keep out!

Matt.txt

This is Matt’s text file…so keep out!

Scott.txt

This is Scott’s text file…so keep out!

Tim.txt

This is Tim’s text file…so keep out!

6.

RENAME.

One of those tools you might require when loading patches orsomething is the ability to rename a file. It’s usually a good idea to make a backup of a file before doing something drastically with it. For example if we had anexecutable called matt.exe that we were going to upgrade we should copy it toanother directory and make a backup of it first. See script 2.

Copy c:\windows\matt.exe c:\temp

Ren c:\temp\matt.exe c:\temp\matt.bak

Script 2—Copying and renaming a file to make a backup.

On the second line we see our rename command. First we indicate the rename,the file to be renamed, and then what the new file name will be.

7.

DOS utilities.Let’s find out about some really neat dos utilities on yourcomputer. Try each file and getting help for each file. These are some from thesame sub-directoryas my command.com file. The ones inbold

will be used a lotin up-coming labs.

ARP.EXE

_______________________________________________CDPLAYER.EXE

_______________________________________________

CLIPBRD.EXE

_______________________________________________

16

CLSPACK.EXE

_______________________________________________

CLEANMGR.EXE _______________________________________________

CONTROL.EXE

_______________________________________________

CVT1.EXE

_______________________________________________

DEFRAG.EXE

_______________________________________________

DIALER.EXE

_______________________________________________

DRVSPACE.EXE

_______________________________________________

EDIT.EXE

_______________________________________________

EXPLORER.EXE

_______________________________________________

FREECELL.EXE

_______________________________________________

FTP.EXE

_______________________________________________

IPCONFIG.EXE

_______________________________________________

JVIEW.EXE

_______________________________________________

MPLAYER.EXE

_______________________________________________

MSHEARTS.EXE

_______________________________________________

NBTSTAT.EXE

_______________________________________________NET.EXE

_______________________________________________

NETSTAT.EXE

_______________________________________________

NETWATCH.EXE

_______________________________________________

NOTEPAD.EXE

_______________________________________________

PACKAGER.EXE

_______________________________________________

PBRUSH.EXE

_______________________________________________

PING.EXE

_______________________________________________

PROGMAN.EXE

_______________________________________________

QFECHECK.EXE

_______________________________________________

REGEDIT.EXE

_______________________________________________

ROUTE.EXE

_______________________________________________

RSRCMTR.EXE

_______________________________________________

SCANDSKW.EXE _______________________________________________

SCANREGW.EXE

_______________________________________________

SETDEBUG.EXE

_______________________________________________

SETVER.EXE

_______________________________________________

SIGVERIF.EXE

_______________________________________________

SMARTDRV.EXE _______________________________________________

SNDREC32.EXE

_______________________________________________

SNDVOL32.EXE

_______________________________________________

SOL.EXE

_______________________________________________

SYSMON.EXE

_______________________________________________

TASKMAN.EXE

_______________________________________________

TELNET.EXE

_______________________________________________

TOUR98.EXE

_______________________________________________

TRACERT.EXE

_______________________________________________

TUNEUP.EXE

_______________________________________________

UPWIZUN.EXE

_______________________________________________

VCMUI.EXE

_______________________________________________

WELCOME.EXE

_______________________________________________

17

WINREP.EXE

_______________________________________________

WINFILE.EXE

_______________________________________________

WINHELP.EXE

_______________________________________________

WINHLP32.EXE

_______________________________________________

WINIPCFG.EXE

_______________________________________________

WINMINE.EXE

_______________________________________________

WINPOPUP.EXE

_______________________________________________

WINVER.EXE

_______________________________________________

WJVIEW.EXE

_______________________________________________

WRITE.EXE

_______________________________________________

WUPDMGR.EXE

_______________________________________________

8.

Let’s look at those in bold a little closer…type the command and /? or ? to findout the available options for the command.

ARP.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

NET.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

PING.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

ROUTE.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

18

NETSTAT.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

IPCONFIG.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________NBTSTAT.EXE

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

_______________________________________________

9.

DOSKEY.

One very nice command for use with DOS is the DOSKEY command.If you enable this during a DOS session you will be able to use the up and downarrows to recall any previously typed commands. This is very nice when you aretrying to ping different computers on the same network. Try it, you’ll like it!(Hint: you can also use F3).

10.

EDIT.

The DOS editor is used to match basic DOS files like batch files. Hereyou can read the contents of some files. Go through and select all options fromeach pull-down menu to see what they do…don’t forget to read the help too!

REM *****************************************************************

REM *

Batch file to change names of those four text files

*

REM *****************************************************************

REM

REM By Matthew J. Basham, 02/21/2002

REM Copyright 2002

REM May not be reproduced without explicit written permission of the

REM author.

ECHO

ECHO Let's start those little buggers up!

ECHO

Pause

copy c:\temp\dave.txt c:\temp\dave.bak

19

pause

copy c:\temp\matt.txt c:\temp\matt.bak

pause

copy c:\temp\scott.txt c:\temp\scott.bak

pause

copy c:\temp\tim.txt c:\temp\tim.bak

pause

ECHO ALL DONE!

Supplemental Lab or Challenge Activity:

1.

Go out to the web and find out what 8.3 means in regards to DOS (especiallyfile names).

2.

Write a batch file to install a\temp folder on the root drive of a computer andmake it a hidden folder.

So What Have I Learned Here?

In this lab you have learned the basics of DOS. I find that many students do not have theexperience with DOS that I had as I was brought up through the Commodore 64’s,IBM’s, 386’s, 486’s, etc. To me it is old-hat…to many newcomers though it is totallyforeign. You will be using DOS while you are working on many of the labs in this bookso I thought it best to put it right up front. Keep referring back to this lab as often as youneed to.

20

Windows Utilities Lab

Objective:

To become better aware of utilities included with Windows 95/98 Operatingsystems.

Tools and Materials:

(1) computer with Win 95/98

paper and pencil

Win 95/98 CD may be needed

Background:

In this lab you will learn the answer to “Why didn’t anyone tell me these programs werehere?” Well, quite simply, you have no one to blame

but yourself. No one gives youanything for free, you have to go out and get it for yourself. As such, this lab is designedto help you explore little-publicized Windows utilities, some of which are pretty nifty.

If you are not familiar with basic DOS commands you should do the DOS commands labfirst. As a network administrator you will need to know basic DOS commands including:searching for files, wild-card characters, changing directories, and manipulating filenames with DOS.

Step-By-Step Instructions:

1.

Open the MS-DOS prompt into a full window.

2.

Enable DOSKEY.

3.

Start hunting for any executable, command, and batch files from the followingprompts: root, windows subdirectory and windows/system subdirectory.Write down all files on your paper.

4.

Go backand execute each file one at a time noting what happens. Some willdo absolutely nothing noticeable. Be sure to check for any availablesubcommands and options using the DOS help feature.

5.

Pare the list down to just the interesting programs.

Supplemental

Lab or Challenge Activity:

1.

Which programs did you find that may be useful to you as a networkadministrator?

2.

If you had two different computers, one with 95 and one with 98, what are thedifferences between the available programs?

3.

Try a Windows 2000 or XP

using the same techniques.

4.

Make a chart comparing the “evolution” of programs in each operatingsystem over time. What has changed for the better, stayed the same, orchanged for the worse?

So What Have I Learned Here?

This is actually almost a repeatof the DOS lab…I just wanted to make sure everyonerealized the difference in the two and that no one skipped over either of these labs.

To be able to install a network interface card (NIC) into a personal computer (PC). In thenext lab you will complete the installation of the NIC by performing the softwareinstallation.

Tools and Materials:

(1) PC

a variety of NIC’s

screwdrivers and nutdrivers

Step-by-Step Instructions:

I guess the old phrase“you get what you pay for” really applies to NIC’s. The moreinexpensive the NIC, usually the more problems you will have installing it. It usuallyapplies more to the software side but I have seen alignment problems with the hardwareside. Do not go cheap on NIC’s unless you want to experiment or have had goodexperiences with a certain brand of NIC’s before.

1.

Unplug the PC power cord from the wall or outlet.

***Warning***

Do not attempt to install a NIC into an energized PC. Electrocution couldoccur.

***Warning***

Some computer towers have extremely sharp edges within them. In thefield we call these “ginsu” covers.

2.

Remove the cover from the PC using screwdrivers or nutdrivers. Every PC isdifferent so go slowly, don’t force anything, and ask

questions whenever needed.

3.

Remove a cover plate from an available slot (usually a PCI or EISA slot) using ascrewdriver.

4.

Gently slide the NIC into the appropriate slot.

5.

Attach the NIC with a screw to the case foundation.

6.

Replace the cover.

7.

Plug in the PCagain (it works better that way).

8.

You are now ready for the software portion of the installation.

Supplemental Lab or Challenge Activity:

1.

Try to see how a Token Ring NIC differs from an Ethernet NIC.

2.

Go and find out the differences in motherboard slots: MCA, ISA, EISA, etc.

So What Have I Learned Here?

You have learned how to physically install a NIC. In the next lab you will be installingthe software portion of a NIC installation.

23

Changing TCP/IP Settings on Your Computer

Objective:

In this lab you will complete the installation of the NIC by performing the softwareinstallation and changing TCP/IP settings. You will be changing TCP/IP settings inmany of the labs in this book.

Tools and Materials:

(1) Workstation

Lab Diagram:

e0/0

192.168.1.1/24

Workstation “A”

IP 192.168.1.2

SM 255.255.255.0

GW 192.168.1.1

Step-by-Step Instructions:

In this lab you will be configuring only the workstation portion of the above lab diagram.

It is just shown as an overall reference perspective.

1.

Open the Network Neighborhood icon on the desktop using a right-click. Thenclick on “properties.” You should see the network window:

Figure 1—Network window.

24

2.

Then scroll down to the TCP/IP configuration for your NIC. On my computer Ipicked this one (highlighted):

Figure 2—Finding the TCP/IP configuration for the NIC.

3.

Double-click it or highlight it and select properties. You should see another popup window like this:

Figure 3—TCP/IP Properties pop up window.

4.

Now, say we are told to put in an IP address of 192.168.1.3 with a subnet mask of255.255.255.0 and a gateway of 192.168.1.1. Here is how we would do it. Firstwe would select “specify an IP address” and then put in IP address and mask onthis window. After doing that the window should look like this:

25

Gateway Tab

Figure 4—Putting in an IP address and mask.

5.

Next we need to switch to the gateway tab (see figure 4) and put in the gatewayaddress. We would type it in and click “add.” Your pop up window will looklike this:

Figure 5—Adding a gateway.

6.

Almost done. To finish it up we click on “ok” on the TCP/IP Properties window,and then “OK” in the network window. You should then be prompted to rebootyour computer to make the settings take effect. If you do not reboot then theywill not work properly.

7.

You can double-check your settings using those DOS or windows commands“IPCONFIG.EXE” or “WINIPCFG.EXE.”

26

Supplemental Lab or Challenge Activity:

1.

Try to find out

about all of those other tabs and settings in the network andTCP/IP Properties windows.

2.

What is a gateway?

So What Have I Learned Here?

Now you are talking about the meat and potatoes of things to come. In almost every labyou will be installing workstation TCP/IP settings. Better learn it good now.

27

Paper Lab: ICONS for Computer Diagrams

Objective:

To learn about ICONS used in CISCO drawings and for what each represents.

Serial—Icon to represent a layer 1/2 cable. V.35 and V.24are common examples.

Circuit Switched Serial—ditto.

Modem—Modulator/Demodulator. Translates analog intodigital signals.

Phone—I should not have to explain this.

PC Camera—Itty bitty camera for your computer.

PolyComm phone—Speaker phone commonly used forconferencecalls.

33

Firewall—Network Address Translation device. Greatwhen they work properly. There is a big future in computersecurity…especially if you can get these things to workright.

Router with firewall—Just what it sounds like…a routerwith

the addition of firewall commands.

Satellite—If you have the bucks you can set up a networkwith this…sometimes you have no choice…think about acruise ship company.

Satellite dish—used with satellites.

CISCO Call manager—Works with Voice over IPequipment. Starting to be a “hot” item for resumes andcareer development.

IP telephone—yes you really can read your email over thisphone…gets its own IP address and everything.

You will see some of these used in the drawings in this book.I put the other ones in herebecause I see them in articles and books.

More ICONs on the web!

http://www.cisco.com/warp/public/784/packet/icons/

http://www.cisco.com/warp/public/503/2.html

34

So what have I learned here?

You have been given a brief introduction to icons used in network drawings. Let’s testyour knowledge here.Without looking back

at the pages can you identify what theseicons represent?

_________________________________________

_________________________________________

_________________________________________

_________________________________________

_________________________________________

_________________________________________

_________________________________________

_________________________________________

35

Paper Lab: Proper Cable for the Proper Job

Objective:

To learn which type of networking cable to use in which instance.

Tools and Materials:

Paper and pencils

Different colored pencils or markers would be nice.

Background:

You will be putting together lots of equipment with plenty of cables during your career.Knowing which cable to use and when will save you plenty of time, trouble, and potentialembarrassment if you get it right from the start. Heck, you can even help someone elselater…most network administrators do not know a straight through from a rollover.

Telephones have been around since the late1800’s and our wiring patterns have evolvedfrom the telephone industry. The two most common wiring patterns are EIA/TIA 568Aand EIA/TIA 568B (Electronics Industry Association/Telecommunications IndustryAssociation). There are four pairs of wires in aCategory 5-type cable. Pair 1 is the bluepair, pair 2 is the orange pair, pair 3 is the green pair, and pair 4 is the brown pair. Foryou football fans…”TheBlue

andOrange

Gators play on theGreen

Grass with theBrown

Football.” In fact, 66 and 110 punch down blocks are wired in this fashion:

White/blue

White/blue

Blue

Blue

White/Orange

White/Orange

Orange

Orange

White/Green

White/Green

Green

Green

White/Brown

White/Brown

Brown

Brown

Figure 1—punch down block.

Unfortunately our wiring patterns for our cables could not align easily with this pattern(figure 2). They had to go and come up with some other ones (see figure 3).

(workstations to hubs,switches to routers, hubs to switches, etc.). The cables are wired with the same wiringpattern on each end.

EIA/TIA

EIA/TIA

568A

568A

ST

EIA/TIA

EIA/TIA

568B

568B

ST

Crossover (xo): Used for connectingsimilar devices

(workstations to workstations,switches to switches, hubs to hubs, etc). The cables are wired with pairs 2 and 3“crossing over” from one end to the other (see also figure 3).

EIA/TIA

EIA/TIA

568A

568B

xo

EIA/TIA

EIA/TIA

568B

568A

xo

37

Rollover (ro): Used for connecting communication ports to other communication ports(workstation com ports to router console ports, etc). It does not matter which colors areused here as long as the pattern “rolls over” from one side to the other.

12345678

ro

87654321

In the following diagrams indicate which type of cable is used, label each cable, apply theappropriate pattern in the drawing, and indicate which port or connection would be usedat the each end of the cable.

Crossover

Rollover

Straight-through

(xo)

(ro)

(ST)

Peer-to-Peer Cabling

Two workstations and a hub

38

Three workstations and a hub

Six workstations (3 to a hub) and two hubs

39

Change hubs to switches:

40

Add in a router:

41

Add in a web access:

DSU/CSU

WWW

42

Peer-to-Peer Networking/File and PrintSharing

Objective:

To learn how to set up two computers to communicate and share files.

Tools and Materials:

(2) Workstations

(1) Cross-connect cable (a.k.a cross-over cable)

Lab Diagram:

NIC

XO

NIC

IP address:

192.168.1.1

192.168.1.2

Subnet Mask:

255.255.255.0

255.255.255.0

Gateway:

192.168.1.2

192.168.1.1

Step-By-Steps Instructions:

1.

Cable the lab as shown. Put one end of the crossover cable in the NIC on onecomputer and the other end in the NIC of the other computer. Make certainthe LED lights up on the NIC when the cable is plugged into BOTH ends. Ifthe lights do not turn on, then check to make sure you have a good crossovercable. Ask your instructor for help if necessary.

2.

Change the TCP/IP

settings on each computer. Do not reboot just yet…wehave to enable file and print sharing first, then we can reboot the computer.Use the lab on “Installing a NIC: software” if you get stuck.

3.

To enable file and print sharing right click on “network neighborhood” (justlike you did for changing the TCP/IP settings. You should see:

file and print sharing

Figure 1—Network settings control panel.

43

4.

Click on the file and print sharing box. You will see:

Figure 2—file and print sharing control panel

5.

Then select the “pick box” for file sharing.” You can pick the one for printsharing if you have printers that need to be shared also. Now you can re-boot(it’s a Canadian term) your computer. It should look like this when you arefinished:

Figure

3—file and print sharing control panel

6.

When your computer is rebooting you will still have to put in user names andpasswords otherwise you will not have your full networking capabilities. Iknow it doesn’t sound right but it is Microsoft after all. Once your computerreboots we have to actually share some files. Otherwise you wouldn’t seeanything when you access the other computer. One easy way to enable filesharing is with the “my computer icon” on your desktop. Double-click on itand you will see something like:

Figure 4—My computer control panel.

44

7.

Then right click on the “C” drive and select sharing. On the other folder youshould only see the “C” drive (which in our case is everything).

Figure 5—Now file sharing can be accomplished.

8.

If you only want to share a specific folder or document double click on the Cdrive to open it and then select the folder or document and pick sharing. Onthe other computer you should only see that folder or document. You shouldsee something like this(pay no attention to that casino folder…its only anexample for another lab

)

Figure 6—Selecting a specific folder to be shared.

9.

In either case you will be presented with a window for setting the parametersfor the share. You can create a name for the drive, folder, or document. Youcan allow full access, read only, or password-protected access to the drive,folder or document.

45

Figure 7—Selecting the options for a share.

10.

Once you are finished select “apply”, then “OK,” and you should beable tosee the drive, folder, or document on the other computer.

Supplemental Lab or Challenge Activity:

1.

Pick one computer to be the computer for your boss. The other will be theemployee. Have only certain folders and documents sharable on the boss’scomputer. Have all drives shared on the employee’s computer. Can yourboss find out where you have been on the Internet?

2.

Why do we use a crossover cable? Why wouldn’t a straight through cablework?

3.

Put a dollar sign ($) on the end of a shared file name and see what happens.

So What Have I Learned Here?

In this lab you have learned how to hook up two computers using peer-to-peernetworking and file and print sharing. For this you needed to use your knowledge ofTCP/IP software settings you learned inan earlier lab. In later labs you will beexpanding upon this knowledge to build more complicated networks and more in-depthfile and print sharing exercises.

46

Small Single-Hub Networks

Objective:

To learn how to hook up several computers with a hub and share files between them.

Tools and Materials:

(3) Workstations

(1) Hub

(3) Straight-through cables

Lab Design:

1 3 5

NIC

NIC

NIC

Name:

A

B

C

IP address: 192.168.1.3

192.168.1.4

192.168.1.5

Mask:

255.255.255.0

255.255.255.0

255.255.255.0

Gateway: none

none

none

Step-By-Step Instructions:

1.

Cable the lab as shown. Each straight-through cable should be connectedfrom the NIC on theworkstation to the respective port on the hub.

2.

Set up the IP addresses and masks on each workstation. No gateway numberis needed because no single device acts as a gateway.

3.

Ping from A to B. Ping from A to C. Ping from B to A. Ping from B to C. Itshould work just fine.

4.

Enable file sharing on each computer. Pick something different on eachcomputer to share…a drive, a folder, or several folders.

5.

You should be able to access the files from computer to computer now usingnetwork neighborhood. If you

cannot “see” the icon for the other computerthen go out to DOS and try to ping them. If you can ping them then use the“Find computer option in Windows Explorer” to manually bring them up inNetwork Neighborhood (gotta love that quirky Microsoft in small networks).

47

You should see something like this:

Figure 1—Using windows explorer to “find” computers on the network.

Figure 2—The “find computer” option pop up window.

If it doesn’t work then check everything you have done so far and reboot

everything.

Supplemental Lab or Additional Activities:

1.

Try to add in more computers. You will have to pick addresses that willwork.

2.

Try to add in another computer with an IP address of 172.16.1.2 and a mask of255.255.255.0. Do you think it will work?

What happens when you try tofind it on the network? Ping it? Share files with it?

3.

Is it possible to hide or secretly share a file? How would it work?

4.

How would you change the identity of your computer on the network?

So What Have I Learned Here?

You have learned how to hook up several workstations to share files using a hub. Youlearned that the IP addresses had to be within the same subnet in order to communicatewith each other. Also you were acquainted with the quirks of Microsoft networking forsmall networks. Microsoft really likes having that hub out there to work.

48

Small Multiple-Hub Networks

Objective:

To learn how to hook up several computers with a hub and share files between them.

Tools and Materials:

(6) Workstations

(6) Hub

(6) Straight-through cables (ST)

(1) Cross-over cable (XO)

Lab Design:

D

E

F

NIC NIC NIC

1 3 5

2

XO

2

1 3 5

NIC

NIC

NIC

A

B

C

Name:

A

B

C

IP address: 192.168.1.3

192.168.1.4

192.168.1.5

Mask:

255.255.255.0

255.255.255.0

255.255.255.0

Gateway: none

none

none

Name:

D

E

F

IP address: 192.168.1.13

192.168.1.14

192.168.1.15

Mask:

255.255.255.0

255.255.255.0

255.255.255.0

Gateway: none

none

none

Step-By-Step Instructions:

1.

Cable the lab as shown. Each straight-through cable should be connected fromthe NIC on the workstation to the respective port on the hub. Use a crossovercable between the two hubs. It should not matter which port you use dependingupon your type of hub. Some have uplink ports that must be used for this

Set up the IP addresses and masks on each workstation. No gateway number isneeded because no single device acts as a gateway.

3.

Ping from each workstation to each other.

4.

Enable file sharing on each computer. Pick something different on each computerto share…a drive, a folder, or several folders.

5.

You should be able to access the files from computer to computer now usingnetwork neighborhood. If you cannot “see” the icon for the other computer thengo out to DOS andtry to ping them. If you can ping them then use the “Findcomputer option in Windows Explorer” to manually bring them up in NetworkNeighborhood (gotta love that quirky Microsoft in small networks).

If it doesn’t work then check everything you have done

so far and rebooteverything.

Supplemental Lab or Additional Activities:

1.

Try to add in another computer with an IP address of 172.16.1.2 and a mask of255.255.255.0. Do you think it will work? What happens when you try to find iton the network? Ping it? Share files with it?

2.

Put in two computers with the same IP address. What kind of message do yousee? Does it appear on one workstation or multiple ones?

So What Have I Learned Here?

You have learned how to hook up several workstations to share filesusing multiple hubs.You learned that the IP addresses had to be within the same subnet in order tocommunicate with each other. As you build larger and larger networks you can seewhere planning for IP addresses is important. Errors make the network act weird. Alsoyou were acquainted with the quirks of Microsoft networking for small networks.Microsoft really likes having that hub out there to work

50

Paper Lab: Binary Numbering

Objective:

To learn how to convert binary numbers into decimal numbers and vice versa.

Tools and Materials:

Paper and pencil

“Bit Bashing” worksheet

Background: Converting Binary to Decimal

If I asked you to count from zero to nine I would expect everyone would have noproblem with it. You would respond with “zero-one-two-three-four-five-six-seven-eight-nine.” This is what is known as the decimal (or base 10) system. There are ten possiblecombinations available for each column. Each column represents a progressively higherpower of ten. For example the number 532:

102

101

100

100

10

1

532 =

5

3

2

This represents 5 units of 102

(10x10=100) which is 5 hundreds, 3 units of 101

(10x1=10)which is 3 tens or 30, and 2 units of 100

(1) which is 2. Put them all together and you getfive hundred and thirty-two. Ok.I know you know this stuff already it will just make thetransition to learning stuff on binary easier.

Binary is a base 2 system. Instead of ten numbers we only have two numbers: zero andone (0 or 1). Like our decimal system our columns each represents a progressivelyhigher power of 2.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

Each column heading represents a decimal number with a binary power. To convertbetween binary and decimal the rule is simple: Any place you have a “1” you just add thecolumn heading to get the decimal total. For example, if we were given a binary numberof 01101101 to convert into decimal we would write it under our “bit-bashing” chart.Then, in any column where a 1 appeared, we would add the column headings together.That would be our binary to decimal equivalent.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

0

1

1

0

1

1

0

1

64+32+8+4+1=109

51

Now along the column headings we see a 1 in the columns for 64, 32, 8, 4, and 1. So weadd these numbers together 64+32+8+4+1=109. Therefore the binary number 01101101is equivalent to the decimal number 109. Let’s do another one…convert 10010101 todecimal.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

1

0

1

0

1

128 + 16+ 4 + 1=149.

It’s another one of those things: easy when you know how. Let’s take a quick time outand let you try some binary to decimal conversions:

1.

10101010

2.

01010101

3.

11001100

4.

11000101

5.

11111111

Now let’s check your answers with the answer section. Did you get the right ones? Icertainly hope so.Try not to use a calculator.

You will not be allowed to use one onthe CCNA test so get practice without it now.

Converting from Decimal to Binary:

This is just the opposite of what we just did except we use subtraction. If we are giventhe decimal number 141 to convert to binary we just subtract our number (141) from eachcolumn heading in succession until we have a remainder of zero. If we encounter anegative number then we put a zero in our bit bashing column. This is tough to explainwithout working it through…so let’s learn by doing. Starting out with our 128 columnheading: 141-

128 = 13. So we put a “1” under the 128 heading and move to the nextcolumn heading.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

Our next one: 13-

64 =-51. Since this is negative we put a zero in the column headingfor 64 and move on to the next one.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

52

Our next one: 13-

32 =-19. Since

this is negative we put a zero in the column headingfor 32 and move on to the next one.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

Our next one: 13-

16 =-3. Since this is negative we put a zero in the column heading for16 and move on to the next one.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

0

Our next one: 13-

8 = 5. So we put a “1” under the 8 heading and move to the nextcolumn heading.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

0

1

Our next one: 5-

4 = 1. So we put a “1” under the 4 heading and move to the nextcolumn heading.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

0

1

1

Our next one: 1-

2 =-1. Since this is negative we put a zero in the column heading for 2and moveon to the next one.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

0

1

1

0

Our next one: 1-

1 = 0. So we put a “1” under the 1 heading.

27

26

25

24

23

22

21

20

128

64

32

16

8

4

2

1

1

0

0

0

1

1

0

1

And we are done…right? Wrong! We shouldalways double-check our work. To do thiswe convert from binary back to decimal. By adding the column headings:128+8+4+1=141. It worked!